Sie sind auf Seite 1von 14

Attempt Time Score

KEPT Attempt 3 5 minutes 40 out of 40

LATEST Attempt 3 5 minutes 40 out of 40

Attempt 2 7 minutes 32.67 out of 40

Attempt 1 9 minutes 16.5 out of 40

Submitted Apr 25 at 5:25pm

Question 1

2 / 2 pts

What is the name of the method in which letters are rearranged to create the ciphertext?

substitution

Correct!

transposition

one-time pad

enigma

Refer to curriculum topic: 4.1.1

Ciphertext can be created by using the following:

Transposition – letters are rearranged

Substitution – letters are replaced

One-time pad – plaintext combined with a secret key creates a new character, which then combines with
the plaintext to produce ciphertext

Question 2

2 / 2 pts
Which term describes the technology that protects software from unauthorized access or modification?

copyright

Correct!

watermarking

trademark

access control

Refer to curriculum topic: 4.3.3

Software watermarking inserts a secret message into the program as proof of ownership and protects
software from unauthorized access or modification.

Question 3

2 / 2 pts

What type of cipher encrypts plaintext one byte or one bit at a time?

elliptical

block

hash

enigma

Correct!

stream

Refer to curriculum topic: 4.1.2

Stream ciphers encrypt plaintext one byte or one bit at a time, and can be much faster than block
ciphers.

Question 4
2 / 2 pts

What are three examples of administrative access controls? (Choose three.)

Correct!

policies and procedures

Correct!

hiring practices

Correct!

background checks

encryption

intrusion detection system (IDS)

guard dogs

Refer to curriculum topic: 4.2.1

Administrative access controls are defined by organizations to implement and enforce all aspects of
controlling unauthorized access and include the following:

Policies

Procedures

Hiring practices

Background checks

Data classification

Security training

Reviews

Question 5

2 / 2 pts

What is the term used to describe the science of making and breaking secret codes?
impersonation

factorization

spoofing

Correct!

cryptology

jamming

Refer to curriculum topic: 4.1.1

Cryptology is the science of making and breaking codes to make sure that cyber criminals cannot easily
compromise protected information.

Question 6

2 / 2 pts

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

one-time pad

asymmetric

hash

Correct!

symmetric

Refer to curriculum topic: 4.1.1

Symmetric encryption algorithms use the same pre-shared key to encrypt and decrypt data.

Question 7

2 / 2 pts

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a
computer user logs in to the machine. What type of access control is implemented?

detective

preventive

masking

Correct!

deterrent

Refer to curriculum topic: 4.2.7

Deterrents are implemented to discourage or mitigate an action or the behavior of a malicious person.

Question 8

2 / 2 pts

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

one-time pad

Correct!

asymmetric

symmetric

transposition

Refer to curriculum topic: 4.1.1

Asymmetric encryption uses one key to encrypt data and a different key to decrypt data.

Question 9

2 / 2 pts

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
hashing

RSA

DES

WEP

Correct!

Diffie-Hellman

Refer to curriculum topic: 4.1.3

Diffie-Hellman provides an electronic exchange method to share a secret key and is used by multiple
secure protocols.

Question 10

2 / 2 pts

Which three processes are examples of logical access controls? (Choose three.)

Correct!

firewalls to monitor traffic

fences to protect the perimeter of a building

Correct!

intrusion detection system (IDS) to watch for suspicious network activity

Correct!

biometrics to validate physical characteristics

guards to monitor security screens

swipe cards to allow access to a restricted area

Refer to curriculum topic: 4.2.1

Logical access controls includes but is not limited to the following:


Encryption

Smart cards

Passwords

Biometrics

Access Control Lists (ACLs)

Protocols

Firewalls

Intrusion Detection Systems (IDS)

Question 11

2 / 2 pts

Which three protocols use asymmetric key algorithms? (Choose three.)

Correct!

Secure Sockets Layer (SSL)

Advanced Encryption Standard (AES)

Correct!

Secure Shell (SSH)

Correct!

Pretty Good Privacy (PGP)

Secure File Transfer Protocol (SFTP)

Telnet

Refer to curriculum topic: 4.1.4

Four protocols use asymmetric key algorithms:

Internet Key Exchange (IKE)


Secure Socket Layer (SSL)

Secure Shell (SSH)

Pretty Good Privacy (PGP)

Question 12

2 / 2 pts

Which two terms are used to describe cipher keys? (Choose two.)

key randomness

keylogging

Correct!

key length

Correct!

key space

Refer to curriculum topic: 4.1.4

The two terms used to describe keys are the following:

Key length - Also called the key , this is the measure in bits.

Keyspace - This is the number of possibilities that a specific key length can generate.

As key length increase, the keyspace increases exponentially.

Question 13

2 / 2 pts

Match the description with the correct term. (Not all targets are used.)

Correct!

steganography
Correct!

steganalysis

Correct!

social steganography

Correct!

obfuscation

Other Incorrect Match Options:

replacing sensitive information in a file with nonsensitive information

Refer to curriculum topic: 4.3.2

Question 14

2 / 2 pts

What term is used to describe the technology that replaces sensitive information with a nonsensitive
version?

hiding

whiteout

Correct!

masking

retracting

blanking

Refer to curriculum topic: 4.3.1

Data masking replaces sensitive information with nonsensitive information. After replacement, the
nonsensitive version looks and acts like the original.
Question 15

2 / 2 pts

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital
signature generation and key exchange?

RSA

IDEA

Correct!

ECC

El-Gamal

AES

Refer to curriculum topic: 4.1.3

Elliptic curve cryptography (ECC) uses elliptic curves as part of the algorithm for digital signature
generation and key exchange.

Question 16

2 / 2 pts

Which three devices represent examples of physical access controls? (Choose three.)

Correct!

locks

routers

Correct!

video cameras

Correct!

swipe cards

firewalls
servers

Refer to curriculum topic: 4.2.1

Physical access controls include but are not limited to the following:

Guards

Fences

Motion detectors

Laptop locks

Locked doors

Swipe cards

Guard dogs

Video cameras

Mantraps

Alarms

Question 17

2 / 2 pts

Which 128-bit block cipher encryption algorithm does the US government use to protect classified
information?

Vignere

Caesar

Skipjack

3DES

Correct!

AES

Refer to curriculum topic: 4.1.2


The Advanced Encryption Standard (AES) is used to protect classified information by the U.S. government
and is a strong algorithm that uses longer key lengths.

Question 18

2 / 2 pts

Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext
at any one time?

symmetric

stream

hash

transform

Correct!

block

Refer to curriculum topic: 4.1.2

Block ciphers transform a fixed-length block of plaintext into a block of ciphertext. To decrypt the
ciphertext, the same secret key to encrypt is used in reverse.

Question 19

2 / 2 pts

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

obfuscation

Correct!

steganography

hiding

masking
Refer to curriculum topic: 4.3.2

Steganography conceals data in a file such as a graphic, audio, or other text file and is used to prevent
extra attention to the encrypted data because the data is not easily viewed.

Question 20

2 / 2 pts

Match the type of multifactor authentication with the description.

Correct!

a security key fob

Correct!

a fingerprint scan

Correct!

a password

Refer to curriculum topic: 4.2.4

Multi-factor authentication uses a minimum of two methods of verification and can include the
following:

Something you have

Something you know

Something you are

Last Attempt Details:

Time: 5 minutes

Current Score: 40 out of 40

Kept Score: 40 out of 40

3 Attempts so far
View Previous Attempts

Unlimited Attempts

Take the Quiz Again

(Will keep the highest of all your

Das könnte Ihnen auch gefallen